cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-18683,https://securityvulnerability.io/vulnerability/CVE-2020-18683,Input Validation Vulnerability in Floodlight Vendor's StaticFlowEntryPusherResource Java Component,"Floodlight, version 1.2, contains a significant input validation flaw within the StaticFlowEntryPusherResource.java component. This vulnerability arises from the mishandling of undefined fields in the checkFlow method. An attacker could exploit this weakness to manipulate the system's behavior leading to unintended effects on network management functionalities.",Atlassian,Floodlight,9.8,CRITICAL,0.005960000213235617,false,,false,false,false,,,false,false,,2021-09-30T01:20:15.000Z,0 CVE-2020-18685,https://securityvulnerability.io/vulnerability/CVE-2020-18685,Input Validation Flaw in Floodlight Network Controller by Floodlight Project,"Floodlight Network Controller version 1.2 contains an input validation flaw in the method checkFlow within StaticFlowEntryPusherResource.java. This vulnerability arises from inadequate checks for TCP or UDP ports, as well as group or table IDs. As a result, attackers could exploit this weakness to bypass intended flow rules, potentially leading to unauthorized access and alteration of network configurations.",Atlassian,Floodlight,9.8,CRITICAL,0.005960000213235617,false,,false,false,false,,,false,false,,2021-09-30T01:18:43.000Z,0 CVE-2020-18684,https://securityvulnerability.io/vulnerability/CVE-2020-18684,Integer Overflow Vulnerability in Floodlight by Floodlight,"An integer overflow vulnerability exists in Floodlight Controller through version 1.2, specifically in the checkFlow method located in StaticFlowEntryPusherResource.java. This vulnerability can be exploited through malformed priority or port number inputs, potentially allowing attackers to manipulate flow entries and compromise network integrity. Identifying and patching this flaw is crucial for maintaining network security.",Atlassian,Floodlight,9.8,CRITICAL,0.00559999980032444,false,,false,false,false,,,false,false,,2021-09-30T01:17:21.000Z,0 CVE-2018-1000617,https://securityvulnerability.io/vulnerability/CVE-2018-1000617,,Atlassian Floodlight Atlassian Floodlight Controller version 1.2 and earlier versions contains a Denial of Service vulnerability in Forwarding module that can result in Improper type cast in Forwarding module allows remote attackers to cause a DoS(thread crash).. This attack appear to be exploitable via network connectivity (Remote attack).,Atlassian,Floodlight Controller,7.5,HIGH,0.0009299999801442027,false,,false,false,false,,,false,false,,2018-07-09T20:00:00.000Z,0 CVE-2015-6569,https://securityvulnerability.io/vulnerability/CVE-2015-6569,,Race condition in the LoadBalancer module in the Atlassian Floodlight Controller before 1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and thread crash) via a state manipulation attack.,Atlassian,Floodlight,5.9,MEDIUM,0.003969999961555004,false,,false,false,false,,,false,false,,2018-02-21T15:00:00.000Z,0